From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id BFD5D42BC4; Sun, 28 May 2023 19:43:16 +0200 (CEST) Received: from mails.dpdk.org (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 93D7840DFB; Sun, 28 May 2023 19:43:16 +0200 (CEST) Received: from mga12.intel.com (mga12.intel.com [192.55.52.136]) by mails.dpdk.org (Postfix) with ESMTP id 091EF40A81 for ; Sun, 28 May 2023 19:43:14 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1685295795; x=1716831795; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=8hFHt3kKWCWI+n+d/rLFfsTDbD4cGZAuRQKEv1UoTJs=; b=HyFD6Lq+3XyRJ5AysJ9/jaH1N3GsQcFP1YMjkRDTODnqEMYh+ZdTW4h/ skjk9o2/auC8NOqqkaIBlGsmg6/e8uRB/PWW1OlHMdNspSvNB02AYnHQV 4rlalHJoKpd9yA5qHhZbh/YWzJUI22BbQDRBCx0Aj6nz2mohFaC0n0hJc b2ZHfNs4slBHB9Jpwqtn4f97HamAIHK6pCgvtOMi+vPdMDNTAhv+bP8ki S2p4+voOhfcPhQhZUXp1jkeogt/2c6ZsuXBQUKFYHQKxRXNtgciHIUfx+ EYh+5eCChckKG5v6cMvGWlOkmP+d78HmBz+B0y7UWNYw2ukPYripCIlHD w==; X-IronPort-AV: E=McAfee;i="6600,9927,10724"; a="334164407" X-IronPort-AV: E=Sophos;i="6.00,198,1681196400"; d="scan'208";a="334164407" Received: from orsmga002.jf.intel.com ([10.7.209.21]) by fmsmga106.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 28 May 2023 10:43:13 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10724"; a="705806207" X-IronPort-AV: E=Sophos;i="6.00,198,1681196400"; d="scan'208";a="705806207" Received: from fmsmsx602.amr.corp.intel.com ([10.18.126.82]) by orsmga002.jf.intel.com with ESMTP; 28 May 2023 10:43:13 -0700 Received: from fmsmsx610.amr.corp.intel.com (10.18.126.90) by fmsmsx602.amr.corp.intel.com (10.18.126.82) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.23; Sun, 28 May 2023 10:43:13 -0700 Received: from fmsmsx611.amr.corp.intel.com (10.18.126.91) by fmsmsx610.amr.corp.intel.com (10.18.126.90) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.23; Sun, 28 May 2023 10:43:12 -0700 Received: from FMSEDG603.ED.cps.intel.com (10.1.192.133) by fmsmsx611.amr.corp.intel.com (10.18.126.91) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.23 via Frontend Transport; Sun, 28 May 2023 10:43:12 -0700 Received: from NAM11-CO1-obe.outbound.protection.outlook.com (104.47.56.174) by edgegateway.intel.com (192.55.55.68) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2507.23; Sun, 28 May 2023 10:43:12 -0700 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=B0Wz0272aAGn8LnohSxsn6/hNJUI3h1Q+5K5L8KGIs+Xs3D+HL8+jczPwEsIeNr0Gb8h2IUT6wviH89dIdNR9eh62uJxJRRbqt3Wardw19SxXJmieFNpXY0k6drCH8KzZn9yQ+tzOwV9fqCqDfDl1XCxG/lkLER6x84vNefhxcYv7g/5Pn6USR32LIaIVdOdrWJFEAA+/v11zKSxduGAAxcR//Zf0UVlKwz2p9CeAaFuxay32D4JZTecCcl1S1Id7lHjBg0774XLv8cSEoI489lDxE0OnXhbG3xNEYNOXDx/a1wS0HuzAqxWNBh50vw8oBP+mMpeiBN6eoYfCDefew== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=w6/Z7QxcXZrfVUFl5Yn8bYz+cEfJ9GNRw8nK38EFBRY=; b=NVm1tg8pWFg83zoSC5y5OuoGlcqNGg0eirqnRXSFgPQ0/OdGvw9mDa28szh6OaBtUnrDevO4km2xV4Z9DFvh7BnC9cZP2HN3vXvVCmg8wGrKIFx7tXpWblgY1Bjk1+k9B1JTyJn3281qOU0aGRXB0xh8ZvApTksoO4T/Oyyz7p5OKFPK47oN5RPFDD4HiwoLZeP0p/SQpvNqmXnQgYQzY1SfQMp3+i8wNwb+BQH5fDl21f6+ki4SEk9YPLNrBu08HnY1gG2yfm51QKjIVGTwwxitru+ufiBN7I3oe+5V4Ag1xw7FrsXVoD/cV+s7BH/ZjVgARoj9H4YoAPrN5d4O2Q== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com; dkim=pass header.d=intel.com; arc=none Received: from PH0PR11MB5013.namprd11.prod.outlook.com (2603:10b6:510:30::21) by BL1PR11MB5368.namprd11.prod.outlook.com (2603:10b6:208:311::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6433.22; Sun, 28 May 2023 17:43:10 +0000 Received: from PH0PR11MB5013.namprd11.prod.outlook.com ([fe80::7172:9542:1603:5ce]) by PH0PR11MB5013.namprd11.prod.outlook.com ([fe80::7172:9542:1603:5ce%6]) with mapi id 15.20.6433.022; Sun, 28 May 2023 17:43:10 +0000 From: "Kusztal, ArkadiuszX" To: Gowrishankar Muthukrishnan , "dev@dpdk.org" CC: "anoobj@marvell.com" , Akhil Goyal , Fan Zhang Subject: RE: [PATCH v2 1/3] cryptodev: add SM2 asymmetric crypto algorithm Thread-Topic: [PATCH v2 1/3] cryptodev: add SM2 asymmetric crypto algorithm Thread-Index: AQHZj7I4OZknzgd0skmNbWvysU00H69v9qiQ Date: Sun, 28 May 2023 17:43:09 +0000 Message-ID: References: <2c0f5049ca90891adb61b2bdfa3c96dbde0e95c2.1685091909.git.gmuthukrishn@marvell.com> In-Reply-To: <2c0f5049ca90891adb61b2bdfa3c96dbde0e95c2.1685091909.git.gmuthukrishn@marvell.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=intel.com; x-ms-publictraffictype: Email x-ms-traffictypediagnostic: PH0PR11MB5013:EE_|BL1PR11MB5368:EE_ x-ms-office365-filtering-correlation-id: 4397c136-e45c-4d04-0920-08db5fa300b8 x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:PH0PR11MB5013.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230028)(346002)(136003)(366004)(39860400002)(396003)(376002)(451199021)(966005)(478600001)(83380400001)(55016003)(5660300002)(186003)(33656002)(71200400001)(4326008)(52536014)(86362001)(7696005)(8676002)(8936002)(2906002)(41300700001)(38100700002)(122000001)(316002)(82960400001)(38070700005)(6506007)(66946007)(76116006)(54906003)(9686003)(110136005)(64756008)(66446008)(66556008)(53546011)(66476007); DIR:OUT; SFP:1102; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?0k/DBag3dxiV4QN2hP4Ej4mBljyqji6T+rBZpRz/yEeAwOV85cjsjzIk8NIM?= =?us-ascii?Q?88Tnj77jQlPAniI5IChLQfPWC1peRCasdMJLSg3Lii53hiHkR1G8j7jxWKAa?= =?us-ascii?Q?W1HnGDexcupjeaasZ39sLFyYXGR05An9myBP6/TTx0K3o0pHDEdm3h+v6ulY?= =?us-ascii?Q?KGdbQEDR9+8hE3kPI5SL07Ppkw0i4uREV/ZdAyykGxmt5MLudX9yCZDjfay8?= =?us-ascii?Q?2w3D4pgE9RK6+NnalTqLorp7U4McL2EuiMiuAwNNw87W2BT5OJ+wHu7Ihs6p?= =?us-ascii?Q?rWRmxXSpjDrf30z4zDzl4xv2Mq3Y5ImCqDBj76ju55yyBSRB1YMcQRzY9hwd?= =?us-ascii?Q?njevsfVv3LbeBV4gLgqsS2Liwt3yBLUtz7XQTErATznHHW9y+PVQ3rezvs4E?= =?us-ascii?Q?V51/TXXlToZBkbl5xm4eSwCIKAKow8M7auWtNQEG6KxIbY1AP6tWq8O+XDVC?= =?us-ascii?Q?jw+bkBqla7YNTLfQSB6P2FCzwEFCaYdmR+/md7WKB1QQb8ITsij0pVnzS79b?= =?us-ascii?Q?TSbvcfLa5L6KV1EJLk7ABeaj7pZ8oXjzjn7iDgyQ4zj18HjB6ZmIKLUniJ0Z?= =?us-ascii?Q?oyqzmFDlwhZDwPpRQCsR7FMPTyB4sznp+pPtg6wHLbRUcKk1K8pFMi0oy/Z2?= =?us-ascii?Q?ZMMdVZYzy0M9+iMlsjBUoSnZr9TeWO/Az89XaOnxgVxE0gYCv3wgeScPbKnH?= =?us-ascii?Q?E8qrzB8ssMd6gpCFcnxiz4qSTDU0MN38Qj1mjcFYsSkltgYk6e8UmF0lDF3v?= =?us-ascii?Q?jMc7PoeR+HzuWGd3kxAvvXdI8HgSQ7jjExMDMTBzTlZhu81FAzHHjghDgDQC?= =?us-ascii?Q?Acqf+OZ/4AwXyqf4zUW06K/YfTpXcRMmD6MtJFuUzlmqCI5d77gd5iZCVkMT?= =?us-ascii?Q?tQNoxVUigx+rDSGHe24tLaGJA/A9Uyek5EPS8XSb5nQmQyMgcAKXusAogkX8?= =?us-ascii?Q?d7tZpXK/4ozhT3zDcyVvvKx8KXxxfDWK4dh3oldkDxFfi1eaQM8anUQs6KHr?= =?us-ascii?Q?JclbDFf9OTcbc++U1psgsoBzek+wwsItfIORjzMIzMkVDCxsZ6/5Z2UeFoJg?= =?us-ascii?Q?McEzAWXiHE12gzPX03vJNafbw+hmRWXconiPm+n5xSg5amacikH6S3B4ZRkd?= =?us-ascii?Q?tS1TB/OAwM5ha6OqWeCUj3hgTTFYyw282RWZwKUMs0zyD3kXtJpSXCfPs3JZ?= =?us-ascii?Q?jqkI3lmtw4ZkFTQF5wwbE8dr7ayLerXDGElKFGDPkw5Can+hSU8JsysHLHX0?= =?us-ascii?Q?qEMgTo3MUC/jZDbUvj5nc9LS5GD7c2dZqHlWzeR/JZZ0PXNOGUts7OcygV5M?= =?us-ascii?Q?kwc4WW+T3DjbUnTQQgb42UiNa4QhLtCL5HwHcoU5iKAUaY9WoiP77T7DyjBW?= =?us-ascii?Q?Ls2dc5Z51S1tN/yoEvp+8+Guoubv5H1Kn17OntUPGJRK4Xz7+AmF6gPOO/I7?= =?us-ascii?Q?sOJg8fYBsffxuV5CotVTMZ1dAGtSuwnQxI9e5TkliVz78TkW3c7s0hYrlM8k?= =?us-ascii?Q?H8BHq8M4fF0D/7Slk0SrLHqGVIYmf3D+x3SolrjYdqJwxv+U9dWGEYkxwB2z?= =?us-ascii?Q?Ky9XO/LopN5b8YtCloM=3D?= Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: PH0PR11MB5013.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 4397c136-e45c-4d04-0920-08db5fa300b8 X-MS-Exchange-CrossTenant-originalarrivaltime: 28 May 2023 17:43:09.8858 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: nRvM8SQGVDuScORjCP53xqP9/wazb2sLSM8ahMjzgkx6qZJqbErzwb4cDHP4OqfFwFeWV/UAmBcxCcRLzcfZHtwJ8azuaJtVpmUYjEl3kj4= X-MS-Exchange-Transport-CrossTenantHeadersStamped: BL1PR11MB5368 X-OriginatorOrg: intel.com X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Hi Gowrishankar, > -----Original Message----- > From: Gowrishankar Muthukrishnan > Sent: Friday, May 26, 2023 11:12 AM > To: dev@dpdk.org > Cc: anoobj@marvell.com; Akhil Goyal ; Fan Zhang > ; Gowrishankar Muthukrishnan > > Subject: [PATCH v2 1/3] cryptodev: add SM2 asymmetric crypto algorithm >=20 > ShangMi 2 (SM2) is a encryption and digital signature algorithm used in t= he > Chinese National Standard. It is more of a set of public-key cryptography algorithms based on elliptic= curves. >=20 > Added support for asymmetric SM2 in cryptodev along with prime field curv= e, as > referenced in RFC: > https://datatracker.ietf.org/doc/html/draft-shen-sm2-ecdsa-02 >=20 > Signed-off-by: Gowrishankar Muthukrishnan > --- > doc/guides/cryptodevs/features/default.ini | 1 + > doc/guides/rel_notes/release_23_07.rst | 5 ++ > lib/cryptodev/rte_crypto_asym.h | 77 ++++++++++++++++++++++ > lib/cryptodev/rte_cryptodev.c | 1 + > 4 files changed, 84 insertions(+) >=20 > diff --git a/doc/guides/cryptodevs/features/default.ini > b/doc/guides/cryptodevs/features/default.ini > index 523da0cfa8..a69967bb9e 100644 > --- a/doc/guides/cryptodevs/features/default.ini > +++ b/doc/guides/cryptodevs/features/default.ini > @@ -125,6 +125,7 @@ Diffie-hellman =3D > ECDSA =3D > ECPM =3D > ECDH =3D > +SM2 =3D >=20 > ; > ; Supported Operating systems of a default crypto driver. > diff --git a/doc/guides/rel_notes/release_23_07.rst > b/doc/guides/rel_notes/release_23_07.rst > index a9b1293689..8b8e69d619 100644 > --- a/doc/guides/rel_notes/release_23_07.rst > +++ b/doc/guides/rel_notes/release_23_07.rst > @@ -55,6 +55,11 @@ New Features > Also, make sure to start the actual text at the margin. > =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D >=20 > +* **Added SM2 asymmetric algorithm in cryptodev.** > + > + Added support for ShamMi 2 (SM2) asymmetric crypto algorithm along > + with prime field curve support. > + >=20 > Removed Items > ------------- > diff --git a/lib/cryptodev/rte_crypto_asym.h b/lib/cryptodev/rte_crypto_a= sym.h > index 989f38323f..35fa2c0a6d 100644 > --- a/lib/cryptodev/rte_crypto_asym.h > +++ b/lib/cryptodev/rte_crypto_asym.h > @@ -119,6 +119,11 @@ enum rte_crypto_asym_xform_type { > /**< Elliptic Curve Point Multiplication */ > RTE_CRYPTO_ASYM_XFORM_ECFPM, > /**< Elliptic Curve Fixed Point Multiplication */ > + RTE_CRYPTO_ASYM_XFORM_SM2, > + /**< ShangMi 2 > + * Performs Encrypt, Decrypt, Sign and Verify. > + * Refer to rte_crypto_asym_op_type. > + */ > RTE_CRYPTO_ASYM_XFORM_TYPE_LIST_END > /**< End of list */ > }; > @@ -382,6 +387,20 @@ struct rte_crypto_ec_xform { > /**< Pre-defined ec groups */ > }; >=20 > +/** > + * Asymmetric SM2 transform data > + * > + * Structure describing SM2 xform params > + * > + */ > +struct rte_crypto_sm2_xform { > + rte_crypto_uint pkey; > + /**< Private key of the signer for signature generation. */ > + > + struct rte_crypto_ec_point q; > + /**< Public key of the signer for verification. */ }; > + > /** > * Operations params for modular operations: > * exponentiation and multiplicative inverse @@ -637,9 +656,66 @@ struct > rte_crypto_asym_xform { > /**< EC xform parameters, used by elliptic curve based > * operations. > */ > + > + struct rte_crypto_sm2_xform sm2; > + /**< SM2 xform parameters */ > }; > }; >=20 > +/** > + * SM2 operation params > + */ > +struct rte_crypto_sm2_op_param { There is no random value 'k'. And SM2 is also using it for encryption. There is no key exchange or point multiplication option in this op, therefo= re, I would rather have all SM2 algorithms in separate ops. We also could abandon finally '_param' suffix, it does not add clarity but = extends struct tags, which are very long already. > + enum rte_crypto_asym_op_type op_type; > + /**< Signature generation or verification */ > + > + rte_crypto_param message; > + /**< > + * Pointer to input data > + * - to be encrypted for SM2 public encrypt. > + * - to be signed for SM2 sign generation. > + * - to be authenticated for SM2 sign verification. Is 'message' in signature case here plaintext or hash? If 'plaintext' it is inconsistent with other signature algorithms, and most= likely not all HW devices will support that. Additionally or hash function should be specified as an argument by the use= r, or the function used should be defined in the API information. I see it is not directly said in this draft what fu= nction it ought be, although most likely SM3 would be the one.=09 > + * > + * Pointer to output data > + * - for SM2 private decrypt. > + * In this case the underlying array should have been > + * allocated with enough memory to hold plaintext output > + * (at least encrypted text length). The message.length field > + * will be overwritten by the PMD with the decrypted length. > + */ > + > + rte_crypto_param cipher; > + /**< > + * Pointer to input data > + * - to be decrypted for SM2 private decrypt. > + * > + * Pointer to output data > + * - for SM2 public encrypt. > + * In this case the underlying array should have been allocated > + * with enough memory to hold ciphertext output (at least X bytes > + * for prime field curve of N bytes and for message M bytes, > + * where X =3D (C1 + C2 + C3) and computed based on SM2 RFC as > + * C1 (1 + N + N), C2 =3D M, C3 =3D N. The cipher.length field will > + * be overwritten by the PMD with the encrypted length. > + */ > + > + rte_crypto_uint id; > + /**< The SM2 id used by signer and verifier and is in interval (1, > +n-1). */ What is this parameter exactly, is it an ID prepended to the signature inpu= t? > + > + rte_crypto_uint r; > + /**< r component of elliptic curve signature > + * output : for signature generation (of at least N bytes > + * where prime field length is N bytes) > + * input : for signature verification > + */ > + rte_crypto_uint s; > + /**< s component of elliptic curve signature > + * output : for signature generation (of at least N bytes > + * where prime field length is N bytes) > + * input : for signature verification > + */ > +}; > + > /** > * Asymmetric Cryptographic Operation. > * > @@ -665,6 +741,7 @@ struct rte_crypto_asym_op { > struct rte_crypto_dsa_op_param dsa; > struct rte_crypto_ecdsa_op_param ecdsa; > struct rte_crypto_ecpm_op_param ecpm; > + struct rte_crypto_sm2_op_param sm2; > }; > uint16_t flags; > /**< > diff --git a/lib/cryptodev/rte_cryptodev.c b/lib/cryptodev/rte_cryptodev.= c index > a96114b2da..21cabc3ffd 100644 > --- a/lib/cryptodev/rte_cryptodev.c > +++ b/lib/cryptodev/rte_cryptodev.c > @@ -299,6 +299,7 @@ crypto_asym_xform_strings[] =3D { > [RTE_CRYPTO_ASYM_XFORM_DSA] =3D "dsa", > [RTE_CRYPTO_ASYM_XFORM_ECDSA] =3D "ecdsa", > [RTE_CRYPTO_ASYM_XFORM_ECPM] =3D "ecpm", > + [RTE_CRYPTO_ASYM_XFORM_SM2] =3D "sm2", > }; >=20 > /** > -- > 2.25.1